𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Advances in Vehicular Networking Technologies

✍ Scribed by Almeida M. (Ed.)


Tongue
English
Leaves
442
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


InTech, 2011. 432 p. ISBN: 978-953-307-241-8.

This book provides an insight on both the challenges and the technological solutions of several approaches, which allow connecting vehicles between each other and with the network. It underlines the trends on networking capabilities and their issues, further focusing on the MAC and Physical layer challenges. Ranging from the advances on radio access technologies to intelligent mechanisms deployed to enhance cooperative communications, cognitive radio and multiple antenna systems have been given particular highlight.

✦ Subjects


Вранспорт;ΠΠ²Ρ‚ΠΎΠΌΠΎΠ±ΠΈΠ»ΡŒΠ½Π°Ρ ΠΈ тракторная Ρ‚Π΅Ρ…Π½ΠΈΠΊΠ°


πŸ“œ SIMILAR VOLUMES


New Advances in Vehicular Technology and
✍ Carmo J.P., Ribeiro J.E. (Edited) πŸ“‚ Library 🌐 English

InTeOp, 2012. - 404 p. ISBN: 9535106982 9789535106982<div class="bb-sep"></div>This book tries not only to fill a gap by presenting new and updated subjects related to the vehicular technology and to the automotive engineering but also to provide guidelines for future research. This book is a result

VANET Vehicular Applications and Inter-N
✍ Hannes Hartenstein, Kenneth Laberteaux πŸ“‚ Library πŸ“… 2010 πŸ› Wiley 🌐 English

<b>This book provides an invaluable introduction to inter-vehicular communications, demonstrating the networking and communication technologies for reducing fatalities, improving transportation efficiency, and minimising environmental impact. <p>This book addresses the applications and technical asp

Security Assessment in Vehicular Network
✍ Suguo Du, Haojin Zhu (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p>This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based method

Internet Access in Vehicular Networks
✍ Wenchao Xu, Haibo Zhou, Xuemin (Sherman) Shen πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles.Β </p><p>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the pra

Internet Access in Vehicular Networks
✍ Wenchao Xu, Haibo Zhou, Xuemin (Sherman) Shen πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles.Β </p><p>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the pra

Internet Access in Vehicular Networks
✍ Wenchao Xu, Haibo Zhou, Xuemin (Sherman) Shen πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p><span>This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. </span></p><p><span>To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling